Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Steganography is the science of embedding information into the cover image viz., text, video, and image without causing statistically significant modification to the cover image. Combining these two techniques either way together result to new technique-Metamorphic Cryptography [14]. The data (text, audio, video, images) is transformed into cipher data using a key, concealed into another cover object (audio, video, images) using Steganography converting it into a Stegno object, and is finally sent to the receiver. Or the data (text, audio, video, images) is concealed into Cover Object resulting into Stegno Object, (Steganography)and further converting Stegno Object into Cipher Stegno Object (audio, video, images) using Cryptography, and is finally sent to the receiver. This proposed both the technique thus achieves double layer security to data.
Published In : IJCSN Journal Volume 2, Issue 6
Date of Publication : 01 December 2013
Pages : 129 - 136
Figures : 14
Tables : --
Publication Link : ijcsn.org/IJCSN-2013/2-6/IJCSN-2013-2-6-150.pdf
[1] Dhawal Seth, L. Ramanathan,”SecurityEnhancement:
Combining Cryptography and Steganography”, International Journal of Computer Applications (0975 – 8887) Volume 9– No.11, November 2010.
[2] Shouchao Song, Jie Zhangb,Xin Liao,Jiao Du Qiaoyan
Wen, “A Novel Secure Communication Protocol Combining Steganography and Cryptography”, 2011 Published by Elsevier Ltd. Selection and/or peer- under responsibility of [CEIS 2011] In Advanced in Control Engineering and Information Science.
[3] T. Sharp.” An implementation of key-based digital signal steganography”. Proc. 4th. Information Hiding Workshop, LNCS, vol. 2137, Berlin: Springer-Verlag, 2001, pp. 13–26.
[4] W.C. Thomas, S. Pantelimon. “Cryptographic Boolean functions and applications”, Elsevier: Academic Press, first edition 2009, pp.119-156.
[5] S.S. Song, J. Zhang, J. Du, Q.Y . Wen.”On the construction of Boolean functions with optimal algebraic immunity and good other properties by concatenation”, Progress in Informatics and
Computing (PIC), 2010 IEEE International
Conference on, Volume1, pp: 417 – 422.
[6] C. Carlet, K. Q. Feng.”New balanced Boolean functions satisfying all the main cryptographic criteria ” [EB/OL]. http://eprint.iacr.org/2008/244.pdf.
[7] Khalil Challita and Hikmat Farhat ,”Combining Steganography and Cryptography: New Directions”, International Journal on New Computer Architectures and Their Applications (IJNCAA) 1(1): 199-208,The Society of Digital Information and Wireless
Communications, 2011 (ISSN 2220-9085).
[8] S.S. Divya, M. Ram Mohan Reddy, “ Hiding Text in Audio Using Multiple LSB Steganography And Provide Security Using Cryptography” International journal Of Scientific & Technology Reseaech Volume 1,Issue 6,July 2012, ISSN 2277-8616 68 IJSTR©2012 www.ijstr.org.
[9] Mr . Vikas Tyagi, Mr. Atul kumar, Roshan Patel, Sachin Tyagi, Saurabh Singh Gangwar,” Image Steganogarphy Using Least Significant Bit with Cryptography”,Journal of Global Research in Computer Science, Reaearch paper Available Online at www.jgrcs.info © JGRCS 2010, Volume 3, No. 3, March 2012.
[10] Gajendra Singh Chandel, Ravindra Gupta, Swati Jain,” Proposed Model of Dynamic Encryption using Steganography”, International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459,
Volume 2, Issue 9, September 2012) .
[11] Abikoye Oluwakemi C,Adewole Kayode S,Oladipupo Ayotunde J.” Efficient Data Hiding System using Cryptography and Steganography” International Journal of Applied Information Systems (IJAIS) – ISSN: 2249-0868 Foundation of Computer Science FCS, New York, USA Volume 4– No.11, December 2012 – www.ijais.org.
[12] Yohan Suryanto,Nur Hayati,Hendra,Kusumawardhana, Dr. Riri Fitri Sari,” Dual Key triple Encryption Text Based Message Suing Cryptography & Steganography”
Int.J.Computer Technology & Applications,Vol 4 (1), 43-50 IJCTA | Jan-Feb 2013 Available online@www.ijcta.com 43 ISSN:2229-6093.
[13] Dr.R.Sridevi,Vijaya, Paruchuri,,K.S.SadaShiva Rao, “Image Steganography combined with Cryptography “,Council for Innovative Research Peer Review Research Publishing System Journal: IJCT Vol 9, No 1 , ISSN 22773061 976 | P a g e J u l y 1 5 , 2 0 1 3 editor@cirworld.com,www.cirworld.com, member.cirworld.com.
[14] Thomas Leontin Philjon. , Venkateshvara Rao. “Metamorphic Cryptography - A Paradox between Cryptography and Steganography Using Dynamic Encryption”,IEEE-International Conference on Recent Trends in Information Technology, ICRTIT 2011 978- 1-4577-0590-8/11/$26.00 ©2011 IEEE MIT, Anna University, Chennai. June 3-5, 2011.
[15] K. Gopalan, “Audio steganography using bit modification”, Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Processing, Vol. 2, pp. 421-424, April 2009.
[16] C. C. Chang, T. S. Chen and H. S. Hsia, “An Effective Image Stenographic Scheme Based on Wavelet Transform and Pattern- Based Modification”, IEEE Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing, 2003.